Blog Categories

Blog

As a consultant, I give a lot of advice. There’s one piece of advice that I never give. I’ll never tell you to quit your job, not to your face anyway. There are a few reasons for this. First of all, your company is paying for the advice, not you, so professionally I need to act in their best interests. Secondly, it’s generally precluded by the contracts I have with my customers. Thirdly, it’s just kind of a jerk move.
But frankly, it’s one of the things I’m often thinkin... read more.

December 9, SecurityWeek – (International) Yahoo pays out $10,000 bounty for critical mail flaw. A security researcher from Finland-based software company Klikki Oy discovered a critical flaw in Yahoo! Mail that could allow attackers to steal a user’s emails and create a worm that spreads by attaching itself to outgoing emails. The researcher found the flaw is related to code inserted into an email when a victim uses the “Share files from cloud providers” attachment option to attach... read more.

December 5, 2016
Chad Sakac, head of Dell EMC’s Converged Platforms Division, is laying out a strategy for how the company will play in the storage and server market to take advantage of what the company estimates to be an $85 billion opportunity.
Microsoft Ventures, Microsoft’s venture-funding group, has been adding more companies to its investment portfolio over the last couple of months.
Splunk helps FamilySearch gain agility in the cloud.
December 6, 2016
Check Point has long been known... read more.

December 8, SecurityWeek – (International) August stealer uses PowerShell for fileless infection. Proofpoint security researchers warned that a new information stealing malware, dubbed August leverages Microsoft Word documents containing malicious macros, which once enabled, launch a PowerShell command to download and install the August stealer on a machine for a fileless infection. The malicious payload is downloaded from a remote site as a PowerShell byte array, and targets customer service and mana... read more.

December 7, SecurityWeek – (International) Windows 10 Creators Update brings new security capabilities. Microsoft reported that the Windows 10 Creators Update, which is scheduled to be released in the spring of 2017, will include several security enhancements including improved detection, intelligence, and remediation capabilities in Windows Defender Advanced Threat Protection (ATP), a feature that will link the Windows Security Center to Office 365 ATP to allow administrators to track a threat across... read more.

November 21, 2016
NetApp CEO George Kurian discusses the cloud, hyper-converged infrastructure, and a very successful fiscal quarter.
Symantec will acquire U.S. identity theft protection services company, LifeLock, for $2.3 billion, in a deal that it hopes will prop up sales at its Norton cybersecurity unit.
Dell EMC announced availability of a new Dell EMC NetWorker with CloudBoost solution for added protection of enterprise applications running on Amazon Web Services (AWS) as well as the extension of t... read more.

November 28, 2016
A mystery bug prevented Outlook.com users from accessing or syncing their accounts from apps and smartphones, but Microsoft says it’s found a fix.
AppSense has been selected as Citrix Ready Partner of the Month from more than 1,000 Citrix Ready Independent Software Vendors.
IGEL Technology, a world leader in the delivery of powerful workspace management software, IGEL Linux-powered thin clients, zero clients, and all-in-one thin client solutions, announced that CRN has recognized... read more.

December 2, SecurityWeek – (International) Eight vulnerabilities found in Moxa NPort devices. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) reported that Moxa’s NPort serial device servers are plagued by eight vulnerabilities after security researchers discovered three critical flaws that can be exploited to retrieve an administrator password without authentication, update the device’s firmware without authentication, and use brute force to bypass authentication,... read more.

December 2, Help Net Security – (International) AirDroid app opens millions of Android users to device compromise. Zimperium security researchers reported that tens of millions of users of Android’s remote management tool, AirDroid are vulnerable to man-in-the-middle (MitM) attacks that could compromise their devices through fraudulent updates and result in data theft. If a user is on the same unsecured network as a malicious actor, the attacker could perform a MitM network attack to access the... read more.